Sentinel-One / sack-cve-fixerLinks
SentinelOne's SACK CVE Fixer
☆22Updated 6 years ago
Alternatives and similar repositories for sack-cve-fixer
Users that are interested in sack-cve-fixer are comparing it to the libraries listed below
Sorting:
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year
- Security Onion Elastic Stack☆46Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Packet communication investigator☆91Updated 2 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- OSINT tool to evaluate the trustworthiness of a company☆43Updated 5 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 7 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- ☆30Updated 6 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- ☆20Updated 5 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆31Updated 5 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆55Updated 3 years ago